/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/ |
H A D | acl_common.kshlib | 464 function get_user_group #uid 466 typeset uid=$1 469 if [[ -z $uid ]]; then 473 value=$(id $uid) 480 log_fail "Invalid UID (uid)."
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_owner_001_pos.ksh | 44 # (1) If uid is granted the write_owner permission, then it can only do 45 # chown to its own uid, or a group that they are a member of. 97 typeset uid=$1 100 if [[ -z $uid ]]; then 104 value=$(id $uid) 111 log_fail "Invalid UID (uid)."
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/history/ |
H A D | history_common.kshlib | 100 typeset uid=$(id -u $user) 106 grep "$cmd \[user $uid ($user) on $hname\]" $NEW_HISTORY >/dev/null \ 212 typeset is_set lflag dflag dsname gname gid uname uid opt str code tmp 267 uid=$(id -u ${tmp%% *}) 269 code="${str}l\$$uid $opt" 278 code="${str}d\$$uid $opt"
|
/illumos-gate/usr/src/uts/common/c2/ |
H A D | audit_event.c | 773 uint32_t uid, gid; local 777 long uid; member in struct:a 781 uid = (uint32_t)uap->uid; 784 au_uwrite(au_to_arg32(2, "new file uid", uid)); 794 uint32_t uid, gid, fd; local 801 long uid; member in struct:a 806 uid = (uint32_t)uap->uid; 839 uint32_t uid, gid; local 844 long uid; member in struct:a 863 long uid; member in struct:a 883 uint32_t uid, gid; local 888 long uid; member in struct:a 1511 uid_t uid, ruid; local 2101 uid_t uid, ruid; local 2233 uint32_t uid; local 2236 long uid; member in struct:a 2608 uint32_t uid; local 2611 long uid; member in struct:a 4884 uid_t uid, ruid; local 5019 uid_t uid, ruid; local 5208 uid_t uid, ruid; local [all...] |
H A D | audit_token.c | 249 au_to_process(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument 266 return (au_to_any_process(data_header, uid, gid, ruid, 271 au_to_subject(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument 287 return (au_to_any_process(data_header, uid, gid, ruid, 294 uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, 307 value = (int32_t)uid; 293 au_to_any_process(char data_header, uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, au_id_t auid, au_asid_t asid, const au_tid_addr_t *atid) argument
|
/illumos-gate/usr/src/uts/common/dtrace/ |
H A D | dtrace.c | 7716 * For DTRACE_PRIV_ALL, the uid and zoneid don't matter. 7779 dtrace_match_priv(const dtrace_probe_t *prp, uint32_t priv, uid_t uid, argument 7803 uid != prp->dtpr_provider->dtpv_priv.dtpp_uid) { 7827 uint32_t priv, uid_t uid, zoneid_t zoneid) 7847 if (dtrace_match_priv(prp, priv, uid, zoneid) == 0) 7993 dtrace_match(const dtrace_probekey_t *pkp, uint32_t priv, uid_t uid, argument 8009 dtrace_match_probe(probe, pkp, priv, uid, zoneid) > 0) { 8052 dtrace_match_probe(probe, pkp, priv, uid, 8077 if (dtrace_match_probe(probe, pkp, priv, uid, zoneid) <= 0) 8826 uid_t uid; local 7826 dtrace_match_probe(const dtrace_probe_t *prp, const dtrace_probekey_t *pkp, uint32_t priv, uid_t uid, zoneid_t zoneid) argument 16072 uid_t uid; local 16574 uid_t uid; local [all...] |
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_srv_attr.c | 2039 uid_t uid; local 2056 * side GETATTR when uid to attribute string conversion cannot 2122 error = nfs_idmap_str_uid(&na->owner, &uid, TRUE); 2130 else if (sarg->vap->va_uid != uid)
|
H A D | nfs4_vnops.c | 1264 * we are root (no root net access). If the real uid 1265 * is not root, then retry with the real uid instead. 3747 * as the server may be faking mode bits or mapping uid/gid. 4227 * and setgid bits when changing the uid or gid. The 12479 uid_t uid, gid_t gid, int isdir) 12486 error = vs_ace4_to_acet(filled_vsap, vsap, uid, gid, FALSE); 12506 error = vs_ace4_to_aent(filled_vsap, vsap, uid, gid, 12478 nfs4_create_getsecattr_return(vsecattr_t *filled_vsap, vsecattr_t *vsap, uid_t uid, gid_t gid, int isdir) argument
|
H A D | nfs4_xdr.c | 764 * owner/group and if so there is no need to call into the uid/gid 765 * mapping code. While the uid/gid interfaces have their own cache 771 uid_t uid; member in struct:ug_cache 806 pug->uid = pug->gid = 0; 1214 vap->va_uid = pug->uid; 1217 uid_t uid; local 1221 error = nfs_idmap_str_uid(&ov, &uid, FALSE); 1238 vap->va_uid = uid; 1241 pug->uid = uid; 1823 uid_t uid; local [all...] |
H A D | nfs_server.c | 1610 * then it will carry root (uid 0) credentials on it, and 2006 * information. Then map root uid/gid to appropriate uid/gid. 2020 uid_t uid; local 2082 access = nfsauth_access(exi, req, cr, &uid, &gid, &ngids, &gids); 2154 } else if (crgetuid(cr) != uid || crgetgid(cr) != gid) { 2155 if (crsetugid(cr, uid, gid) != 0) 2218 * mapped to uid 0 get all privileges, so setting cr's 2281 uid_t uid; local 2325 access = nfsauth4_access(cs->exi, cs->vp, req, cr, &uid, [all...] |
/illumos-gate/usr/src/uts/common/fs/smbclnt/smbfs/ |
H A D | smbfs_vfsops.c | 519 smi->smi_uid = STRUCT_FGET(args, uid);
|
/illumos-gate/usr/src/cmd/auditreduce/ |
H A D | token.c | 528 * ace who adr_u_int32 (uid/gid) 552 * uid adr_int32 566 int32_t uid; local 569 adrm_int32(adr, &uid, 1); 576 if (m_usere == uid) 589 (obj_owner == uid)) 599 * uid adr_int32 613 int32_t uid; local 616 adrm_int32(adr, &uid, 1); 623 if (m_usere == uid) 660 int32_t uid; local 839 int32_t uid, gid, cuid, cgid, mode, seq; local 1815 uid_t uid; local 1876 int32_t uid; local 1900 int32_t uid; local [all...] |
/illumos-gate/usr/src/cmd/zdb/ |
H A D | zdb.c | 1592 * print uid or gid information. 1613 dump_uidgid(objset_t *os, uint64_t uid, uint64_t gid) argument 1617 uid_idx = FUID_INDEX(uid); 1633 print_idstr(uid, "uid"); 1644 uint64_t uid, gid, mode, fsize, parent, links; local 1676 SA_ADD_BULK_ATTR(bulk, idx, sa_attr_table[ZPL_UID], NULL, &uid, 8); 1720 dump_uidgid(os, uid, gid);
|
/illumos-gate/usr/src/lib/libc/port/ |
H A D | llib-lc | 525 int getpw(uid_t uid, char *buf); 529 struct passwd *getpwuid(uid_t uid); 1775 extern int __init_daemon_priv(int, uid_t uid, gid_t gid, ...);
|
/illumos-gate/usr/src/lib/librestart/common/ |
H A D | librestart.c | 2043 if (mcp->pwbuf != NULL && mcp->pwd.pw_uid == mcp->uid) 2056 pwdp = getpwuid_r(mcp->uid, &mcp->pwd, mcp->pwbuf, 2089 * ERANGE the uid is too big 2090 * EINVAL the string starts with a digit, but is not a valid uid 2100 uid_t uid; local 2104 uid = strtol(str, &cp, 10); 2106 if (uid == 0 && errno != 0) { 2115 if (uid > UID_MAX) 2118 *uidp = uid; 2219 if (cip->uid [all...] |
H A D | librestart.h | 273 uid_t uid, euid; member in struct:method_context
|
/illumos-gate/usr/src/lib/libzonecfg/common/ |
H A D | libzonecfg.c | 129 #define DTD_ATTR_UID (const xmlChar *) "uid" 2929 get_detach_dev_entry(const char *name, uid_t uid, gid_t gid, mode_t mode, argument 2945 (void) snprintf(buf, sizeof (buf), "%lu", uid); 2994 * call-back will be passed the name, uid, gid, mode, acl string and the
|
/illumos-gate/usr/src/uts/common/os/ |
H A D | cred.c | 802 crsetugid(cred_t *cr, uid_t uid, gid_t gid) argument 808 if (!VALID_UID(uid, zone) || !VALID_GID(gid, zone)) 811 cr->cr_uid = cr->cr_ruid = cr->cr_suid = uid; 1036 * root (no root net access). Check the real uid, if it isn't root 1037 * make that the uid instead and retry the call.
|
H A D | exec.c | 571 uid_t uid, gid; local 617 (privflags = execsetid(vp, &vattr, &uid, &gid, &fset, 634 cred->cr_uid = uid; 636 cred->cr_suid = uid; 704 "!uid %d: setuid execution not allowed, " 708 "!uid %d: setuid execution not allowed, " 716 cmn_err(CE_NOTE, "!zone: %s, uid: %d " 721 cmn_err(CE_NOTE, "!zone: %s, uid: %d " 737 * whether we gained any privileges or executed a set-uid executable. 754 * the file just executed was set-uid o 1032 uid_t uid, gid; local [all...] |
H A D | policy.c | 97 * checks for uid 0. The rationale behind these is that many root 905 * uid of owner of vnode 1098 * Are we allowed to retain the set-uid/set-gid bits when 1100 * "issuid" should be true when set-uid; only in that case 1380 * ovap. In certain situations set-uid/set-gid bits need to be removed; 1417 * to add the set-uid bit, if we're not the owner. 1418 * In the specific case of creating a set-uid root 1437 * chown to other uid FILE_CHOWN_SELF 1645 * privilege is not sufficient to get uid 0. 1650 * get the powers of root wrt uid 2556 secpolicy_smbfs_login(const cred_t *cr, uid_t uid) argument [all...] |
H A D | priv_defs | 107 In order to write files owned by uid 0 in the absence of an 108 effective uid of 0 ALL privileges are required. 125 Allows a process to create hardlinks to files owned by a uid 126 different from the process' effective uid. 136 permission bits or ACL except for the set-uid and set-gid 154 set-uid 0 file. 195 Additional restrictions apply if the owner of the object has uid 0 196 and the effective uid of the current process is not 0. 204 Additional restrictions apply if the owner of the object has uid 0 205 and the effective uid o [all...] |
H A D | zone.c | 5875 uid_t uid; local 6263 uid = crgetruid(newcr); 6265 upcount_dec(uid, GLOBAL_ZONEID); 6266 upcount_inc(uid, zoneid);
|
/illumos-gate/usr/src/uts/common/smbsrv/ |
H A D | smb_kproto.h | 639 uint16_t uid, smb_user_state_t st);
|
/illumos-gate/usr/src/uts/i86pc/sys/ |
H A D | acpidev.h | 88 #define ACPIDEV_PROP_NAME_ACPI_UID "acpi-uid" 93 #define ACPIDEV_PROP_NAME_UID_FORMAT "acpidev-uid-format" 458 * Try to generate meaningful device unit address from uid. 461 extern char *acpidev_generate_unitaddr(char *uid, char **fmts, size_t nfmt,
|
/illumos-gate/usr/src/boot/sys/sys/ |
H A D | mount.h | 271 #define MNT_EXPORTANON 0x0000000000000400ULL /* anon uid mapping for all */ 427 uid_t ex_root; /* mapping for root uid */ 442 uid_t ex_root; /* mapping for root uid */ 608 typedef int vfs_quotactl_t(struct mount *mp, int cmds, uid_t uid, void *arg);
|